<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Public IP Behind PaloAlto in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43178#M31669</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dburns,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. I notice you are possibly in San Diego. Can I buy you a&amp;nbsp; cup of coffee?&amp;nbsp; As I'm new to PA gear.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Sep 2014 19:11:53 GMT</pubDate>
    <dc:creator>pdvpanetworks</dc:creator>
    <dc:date>2014-09-10T19:11:53Z</dc:date>
    <item>
      <title>Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43173#M31664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a /24 public IP network where some of the IPs will not NAT and some will NAT.&amp;nbsp; For the scenario were there will be no NAT, the host behind the PaloAlto will have a public IP assigned to the NIC.&amp;nbsp; Under what scenario would I break up the /24 into smaller subnets or leave the subnet as a large /24.&amp;nbsp; This is for a pa-500 in Layer 3 configuration, where there is a separate public /29 that is assigned to the PaloAlto, the /24 is routed to an IP on the public /29.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2014 15:14:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43173#M31664</guid>
      <dc:creator>pdvpanetworks</dc:creator>
      <dc:date>2014-09-09T15:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43174#M31665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pdv,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you havent used subnet mask in NAT policy, Normally it should be /32 mask in NAT policy. If its bigger sometimes it cause problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2014 16:13:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43174#M31665</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-09T16:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43175#M31666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should be able to configure the /24 directly on an L3 interface and DNAT any of the IPs in that space to private IPs addresses in other zones. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Untrust 11.11.11.11/29 dmz1 22.22.22.1/24 dmz2 192.168.1.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNAT rule would read Untrust -&amp;gt; dmz1 -&amp;gt; DstIP 22.22.22.2 -&amp;gt; DNAT IP 192.168.1.2&lt;/P&gt;&lt;P&gt;Your security rule would read: Untrust -&amp;gt; dmz2 -&amp;gt; DstIP 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just make sure not to use the 22.22.22.2 address in your DMZ1 zone (;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2014 14:27:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43175#M31666</guid>
      <dc:creator>dburns</dc:creator>
      <dc:date>2014-09-10T14:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43176#M31667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dburns,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your scenario allows the /24 with NAT, what about NAT and where a server inside the PA has an IP from the same /24, no NAT? Any issue there?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2014 18:37:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43176#M31667</guid>
      <dc:creator>pdvpanetworks</dc:creator>
      <dc:date>2014-09-10T18:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43177#M31668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No issue. The only issue would be if you were trying to configure one of machines with a public IP address which had a DNAT configured for it. That would not work the DNAT would be applied and the machine would not be reachable from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2014 18:50:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43177#M31668</guid>
      <dc:creator>dburns</dc:creator>
      <dc:date>2014-09-10T18:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43178#M31669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dburns,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. I notice you are possibly in San Diego. Can I buy you a&amp;nbsp; cup of coffee?&amp;nbsp; As I'm new to PA gear.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2014 19:11:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43178#M31669</guid>
      <dc:creator>pdvpanetworks</dc:creator>
      <dc:date>2014-09-10T19:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP Behind PaloAlto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43179#M31670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dburns,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any reason to not make these all in a VLAN?&amp;nbsp; &lt;A href="https://pdvcorp-my.sharepoint.com/personal/dfoxley_pdvcorp_com/_layouts/15/guestaccess.aspx?guestaccesstoken=tg%2bwisVkK7giCPd0XpeZRiWTq64WNr%2fkCSMuysp3Yss%3d&amp;amp;docid=09a86ada976d3443bbe4d28e8b02d9a31"&gt;See this pic&lt;/A&gt;.&amp;nbsp; As show in the this &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/servlet/JiveServlet/previewBody/1618-102-3-7490/Layer2_Networking-PAN-OS-revB.pdf"&gt;PA Doc.&lt;/A&gt; securing Inter VLAN traffic.&amp;nbsp; I don't need to router between VLANs, necessarily, but breaking up the /24 into smaller subnets, as shown in that pic, makes security of the networks and management simpler on the switch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Sep 2014 21:01:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/public-ip-behind-paloalto/m-p/43179#M31670</guid>
      <dc:creator>pdvpanetworks</dc:creator>
      <dc:date>2014-09-25T21:01:36Z</dc:date>
    </item>
  </channel>
</rss>

